The code has security issues, the sender polynomial key-value pairs are computed to get g^b and then multiplied by the scalar, if g^b is a random value, not g^b obtained by polynomial interpolation performed by the receiver. then g^b^a will not be a random string, but an extremely distinguishable value.

The code has security issues, the sender polynomial key-value pairs are computed to get g^b and then multiplied by the scalar, if g^b is a random value, not g^b obtained by polynomial interpolation performed by the receiver. then g^b^a will not be a random string, but an extremely distinguishable value.
